Upload
sai-praveen-seva
View
391
Download
3
Embed Size (px)
DESCRIPTION
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism. Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.[1] Objectives may be political or ideological since this is a form of terrorism[citation needed]. There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.
Citation preview
OVERVIEW
•Terms
•Cyber-terrorists
•Why cyber-terrorism
•Forms of cyber-terrorism
•Impact
•Effects
•Examples
•Conclusion
TERMS
•Cyber terrorism – The use of the Net for
terrorism.
•Cyber crime – The use of the Net for criminal
actions.
•Cyber Attacks – Email bombs, viruses, intentional
actions.
•Information Warfare – Formalized governmental
warfare
•Techno Terrorism – Use of technology by terrorist
groups
CYBER-TERRORISTS
An individual that uses
computer\network technology (i.e.,
networks, computers, Internet) to 6-9-
cause intense fear; one who uses
computer\network technology to
control, dominate, or coerce through
the use of terror in furtherance of
political or social objectives.
• Big targets can be attacked
• The tremendous, nole computer
stimulated crimals and terrorists
to make it their prefered tool for
attacking targets
Forms of CYBER-TERRORISM
1.Privacy Violation:
•The law of privacy is the
recognition of the
individual's right to be let
alone and to have his
personal space inviolate.
•Man has become sensitive
to publicity.
•Information technology
misuses the data of
private individuals
•A computer network
owned by the
Government may contain
valuable information
concerning defence and
other top secrets.
2.Secret information appropriation and data theft:
3.Distributed denial of Service
Attack
•The cyber terrorists may also use
the method of distributed denial
of services (DDOS) to
overburden the Government and
its agencies electronic bases.
•This is made possible by first
infecting several unprotected
computers by way of virus
attacks and then taking control of
them.
•This activity may divert
the attention of the
security agencies for the
time being thus giving
the terrorists extra time
and makes their task
comparatively easier.
4.Network Damage and Disruption:
What would the Impact be?
The intention of a cyber terrorism attack could range from
economic disruption through the interruption of financial
networks and systems or used in support of a physical
attack to cause further confusion and possible delays in
proper response
1.Direct Cost Implications.
2.Indirect Cost Implications.
Effects
•Cyber terrorism can have a serious large-scale
influence on significant number of people.
•It can weaken countries' economy greatly, thereby
stripping it of its resources and making it more
vulnerable to military attack.
Examples
•Terrorists in Romania gained access to the
computers controlling the life support systems at an
Antarctic research station, endangering the 58
scientists involved.
•The official web site of the Presidential Palace of
Afghanistan was affected by a DOS attack that
rendered it inaccessible.
• The internet has provided
a virtual war for countries
having problems with
other such.
* As taiwan against
China.
* Israel against Palestine.
*India against pakistan,
China
How can we protect ourselves?
•All accounts should have passwords and the
passwords should be unusual, difficult to guess
•Change the network configuration when defects
become visible
•Audit systems and check logs to help in detecting
and tracing an intruder
•If you are ever unsure about the safety of a site, or
receive suspicious email from an unknown address,
don't access it
CONCLUSION
• After a close look at some of the facts, I have come
to the these conclusions. Some of my conclusions
point to the fact that Cyberterrorism could be an
actually threat. But the other part is that there is too
much media hype created around the possiblity of a
Cyberterrorism.